.

Monday, February 25, 2019

Digital Crime and Terrorism Essay

AbstractThe riding habit of the meshwork for immoral purpose is peerless of the virtu each(prenominal)y lively challenges facing the FBI and truth enforcement in habitual. Understanding and using the internet to armed combat Internet Fraud is meaty for law enforcement. The imposter universe founderted over the Internet is the truly(prenominal) Type of white collar fraud the FBI has traditionally investigated but poses special concerns And Challenges, be condition of the naked environment in which it is located. The Internet is a perfect fomite to locate victims and endure the environment where the victims Dont see or speak to the double-dealing. The Internet environment often creates a false genius of protective covering among users leading them to check out opportunities found on the Internet less Thoroughly than they might otherwise. computing device detestation poses a intimidating task for law Enforcement agencies because they argon highly Technical nuis ances.Law enforcement agencies essential Have individuals trained in ready reckoner science or computing machine forensics in order to properly to Properly investigate reckoner shames. Computer discourtesy is defined as both soul that violates any Of the victual of the following unauthorized access to a computer system, Theft of computer Services, Interruption of computer Services, Misuses of computer system learning, and Destruction of computer equipment. The general heading of computer crime shadower electric potentially Cover an start out of offense by examining several existing definitions of computer crime, as wellhead as Elements suggested as essential, some Have defined computer crime as any offense that uses or Somehow involves a computer. manipulation of Internet and crimeThe growth of the Internet has improved our economy, medicine and engineering. Unfortunately, it has brought new opportunities for culpable activity, as well. Often, people Think cyber-crime simply refers to hacking, viruses and other invasion tactics. Cyber- crime, However, threatens more than our vocationes, economy or domainal infrastructure. Cyber- crime Affects us individuals, as well. Reprehensible crimes, such as pincer lampblack and cyber Stalking, terrorize our children and our families.At the first hearing in this series, on May 24th, the Texas Deputy attorney General for woeful Justice testified that, quote, One of the biggest problems is that computer criminals are targeting The well-nigh vulnerable of our society, children. He pointed out that, according to the Federal Bureau of Investigation, child pornography was virtually extinct prior to the advent of the Internet. Now it is a serious plague on our society that essential be stopped.Adults alike experience the dark side of the Internet revolution. Using computer technology, bend types steal life savings and even identities of unsuspecting individuals. These pose atrocious threats to the l ives and the livelihoods of many individuals. But in addressing these areas Of crime, law-enforcement officers face several challenges. Identifying a modern criminal Can be difficult. Once they are identified, bringing a criminal to justice may be problematic for Jurisdictional reasons.The criminal may be in a different State or even a nonher country, and then law enforcement Officials moldiness deal with extradition issues. Also, retrieving the learning stored on a computer And using it for prosecution may be difficult if it requires highly technical skills non normally Taught to investigators or prosecutors. As long as there is technology, cybercrime go out exist, yet Cybercrime mustiness be curtailed as much as possible so that technology gutter legitimately continue To enrich our lives and strengthen our economy.Congress understands that law-enforcement officials must shake off the appropriate training and Equipment to fight fire with fire, or computer technology with com puter technology but Law-enforcement must remain cognizant of the take in to comfort the law-abiding publics Privacy while protecting the public. The public must understand that law-enforcement does compulsion To use technology to deal with this new insurrection threat to our children, our economy and our National security.Under current law, law-enforcement authorities must apply for the identical order in multiple Jurisdictions, make burdens and delays that pull in no one but criminals. Congress should look At the theory of a single order that would cover these kinds of requests comprehensively. Over the last decade, use of computers and the Internet has grown exponentially. Indeed, for Many individuals it is an integral touch off of their daily lives. With teeny more than a click of a Mouse, people can communicate, polish off information, engage in commerce, and expand their Educational opportunities. Unfortunately, criminals exploit these same technologies to commit Cr imes and harm the safety, security, and privacy of us all.Indeed, as more people go online, More criminals are realizing that online crime can be lucrative, especially prone the amount of Valuable commercial and private information now being stored electronically. So-called cybercrime can be divided into two categories. On the one hand, we are seeing the Migration of traditional crimes from the physical to the online world. These crimes include Threats, child pornography, fraud, gambling, extortion, and thieving of intellectual property.SimplyPut, criminals are migrating online because they can reach more victims quickly, can collaborate With other criminals, can disguise their identities, and can use the worldwide nature of the Internet to Remain anonymous. On the other hand, the Internet has spawned an solo new set of criminal Activity that targets computer networks them. Included in this category are such crimes as Hacking, releasing viruses, and shutting passel computers b y flooding them with unwanted Information (so-called denial of attend to attacks). Our picture toand the detriments caused Bythis type of crime are astonishingly high.For example, in May of last course, the I Love You Virus began to infect computers on the Internet. Within a short period of time, it had disrupted the communications of hundreds of Thousands of computers, causing losses estimated in the billions of dollars. Virus demonstrated a new dexterity when it infected a computer, it accessed the users Computer passwords and sent them electronically to a computer in a foreign country. The Implications of this virusand the many viruses that arrive at followed itare staggering.In March of this year, the FBIs National Infrastructure Protection reduce issued a warning that An organized group of hackers from Russia and Eastern Europe had act a series of Intrusions into more than forty banks and e-commerce companies in the United States. The Hackers take over 1,000,000 quota tion taunt numbers from the companies data bases. They then Embarked on extortion of many of the companies, threatening to disclose confidential Information or damage the victims computer systems. Evidence suggests that the hackers then Sold many of the credit card numbers to organized crime groups. This crimethe investigation into which the Treasury surgical incision participated and which has to Date resulted in two arrestshas grave implications. Not only did it cause financial losses forThe Companies, but it harmed the privacy and security of the ordinary citizens whose credit Cards numbers and personal data were stolen. Individuals victimized by these sorts of rightfully Fear the ramifications of criminals gaining access to their private financial and Personal data. This type of crime strikes at the confidence of consumers, threatening the vital Growth of e-commerce.Network crimes not only affect the security of individuals and businesses, they can overly threaten Our nations critical infrastructures. Our power and water supply systems, telecommunications Networks, financial sector, and critical governing body services, such as emergency and theme Defense services, all rely on computer networks.Cyber terrorist, the same devastating result could be achieved by hacking into the control Network and commanding the computer to open the floodgates. This is not a purely hypothetical Scenario. Several years ago, a youthful hacker gained unauthorized access to the computers Controlling the operations of the Roosevelt Dam in Arizona.Although there are as yet no definitive statistics on the scope of the problem, there is no doubt That the number of crimes involving computers and the Internet is rising dramatically. For Example, the CERT Coordination Center, which was created to warn about computer attacks and Viruses, received over 21,000 network crime incident reports last year. This is more than double The number of reports it received the year before. Similarl y, a survey conducted by the FBI and The Computer Security Institute tardily revealed substantial increases in computer crime. Over 85 percent of the companies and government agencies surveyed reported computer securityBreaches within the preceding twelve months, up from 70 percent last year. Moreover, Researchers at the University of California at San Diego deep reported a methodology that Enabled them to count the numbers of denial of service attacks. Their research revealed that 4,000 attacks occur every week. Responding to these threats is a daunting challenge. From my perspective, as I begin my assessment of our cybercrime efforts and the direction they Should take in the future, at to the lowest degree three themes or elements seem to emerge as oddly? great to success in confronting cybercrime developing specialize expertise, building Teamwork and partnerships, and assuring we work legal authorities which are both effective and Appropriate in the unique and ever-evolvin g setting of computers and the Internet.DEVELOPING SPECIALIZED EXPERTISECombating computer crime requires a team of professionals, including investigators, forensic Experts, and prosecutors, all of whom have technical expertise. In addition to traditional Investigative skills, cybercrime investigators must be well inner in the intricacies of technology To insure that try is not lost or overlooked. Forensic experts must complete how to handle Electronic evidence to protect its integrity for later use at trial, as well as how to recover and Analyze digital evidence from computers with hard drives that store gigabytes of data.And Prosecutors must understand the jargon and complexities of high-technology crimes and be able To translate technical evidence into a form understandable to a judge and jury. United States law enforcement agencies have devoted significant resources to developing cadres Of investigators and forensic experts who have the specialized skills needed for cybercrim e Investigations. The FBI and Secret Service, which have particularly classic investigative Responsibilities with abide by to Internet and computer-related crimes, have certainly been in theA particularly Copernican aspect of developing, and then sharing expertise in the field is the across the nation network of federal prosecutors called Computer and Telecommunications Coordinators (or CTCs)at least one from each districtwho serve as the districts Prosecutorial expert on computer crime cases. The CTC initiative was started by CCIPS in 1995, And has been strongly back up by our U.S. lawyers. CCIPS trains and supports these Coordinators specially, so that they, in turn, can serve as a resource for their offices and the law Enforcement authorities and concerned industry in their regions of the country.In the Criminal Division, specialized expertise in combating cybercrime is not confined to CCIPS. other(a) sections have developed this expertise as traditional forms of criminalit y have Moved onto the Internet.For example, the subdivision has seen dramatic growth in various types of fraudulent online Schemes, and the Criminal Divisions Fraud sectionalisation has played a critical role in the Justice Departments response, including overseeing a Department-wide Internet Fraud Initiative begun In 1999. Its work to date has include (1) advising and supporting federal prosecutors throughout The country, including maintenance of an Internet fraud shortened bank (2) developing specialized Training on Internet fraud for courses at the Departments National Advocacy Center (3) publishing extensive materials on the Departments website, www.internetfraud.usdoj.gov, in Order to farm public understanding of Internet fraud schemes and how to deal with them and (4) Supporting improvements in federal agencies investigative and analytical resources, Including the Internet Fraud Complaint Center, a joint project of the FBI and the National Collar Crime Center.The Departme nt has to a fault been involved in the related problem of identity Theft, in part by providing national coordination of governmental efforts through the Identity Theft Subcommittee of the Attorney Generals Council on White Collar Crime. Of course, one of the most disturbing facets of cybercrime is the exploitation and abuse of Children, whether through distribution of child pornography over the Internet or through the Horrific conduct of informal predators that operate online.The FBI, the U.S. Attorneys Offices, And the Divisions Child Exploitation and Obscenity Section have developed special expertise In Investigating and prosecuting these crimes and currently devote significant resources to the Online aspects of child pornography and luring cases. Moreover, in this area and others, the Departments Office of Legal Education, in conjunction with various components of the Criminal Division regularly sponsors classes regarding computer crime and electronic evidence.BUILDING PARTNERS HIPSAs I noted at the beginning of my statement, the second element which seems particularly Important to our efforts against cybercrime is partnership building. Of course, from years as a Prosecutor, I know that teamwork is essential to any successful crime-fighting effort. But it Strikes me that in the area of cybercrime the need for effective partnerships, is not only Especially important but also requires partnerships well outside the traditional law enforcement Community. The complexity of cybercrime and the breadth, or potential breadth of its Impact, are part of the reason. However, another factor is the diversity of interests at play in the Cyber-world, and hence in our efforts to combat cybercrime. These include, among others, law Enforcement Interests, national security interests, privacy interests, and Commercial interests. Partnership, or at least dialogue, we will allow those interests to conflict and collide in ways Destructive of our efforts to combat cybercrime.VIRUS ES AND MALICOUS CODEViruses and malicious write in code are simply programs and like any other program, are designed for a Specific function. A virus or malicious code program iswritten for a kind of noncriminal Purposes including advertisements, jokes, and political messages, however, less humorous and More malicious intentions include destroying data, information, information acquisition, and Identity theft, surreptitious control of a remote machine, or the resolution of a legitimate business Or website. The virus is executed by some type of payload trigger, which causes the virus or Malicious code to deliver its contents or execute its commands. The trigger can be something The user does, such as opening an email attachment or downloading a file, it can be triggered By some event such as date or condition on a computer, or it can self- execute based on code Written into the virus program.PHISHINGThe term phishing means the fraudulent attempt to get a persons private informatio n (i.e. Username, password, account number, etc.). Phishers send an email make-believe to be from a legitimate company and have words you to provide your common soldier information. Typically the email will address you as a node and will direct you to Click on a affair to provide critical information to avoid a looming problem which they have Discovered. This link will be to a false website not the website of the legitimate company.Basically, they are fishing for peoples information to use illegally. Phishing is a very Sophisticated scam and many individuals and companies have been fooled, resulting in the theft Of their huffy information as well as millions of dollars every year. The email is usually designed to look like it is sent from a real company. The bait for personal Information is often contained in the emails caseful line. The subject usually contains a sense of Urgency. For example, it will read in ones inbox Your account needs to be verified or Your Account is about to be suspended.CONCLUSIONIt is important to note that computer security is always dependent on the weakest link in the Chain. Security on the Internet and exposure to a potential attack is particular upon the security Or lack thereof, of other parts of the network. It is also important to note that there is an Increasing number of dedicated infrastructure attacks.The mutualness of systems connected To the Internet used to carry out day-to-day business is ever growing and increasingly being Relied upon by variety of businesses, governments, and a numerous of other operations. There are four categories DDoS, worms, attacks on the Internet Domain Name System (DNS) And attacks against or using routers. Any attacks severalize from my research could lead to Denial Of Service, compromise of sensitive or personal information, misinformation, and an extreme Economic impact, largely from lost revenue and the time and resources demand to recover.ReferenceSecond Edition Digital Crime and Digital Terrorist (Robert W. Taylor, Eric J. Fritsch, conjuring trick Liederbach, and Thomas J. Holt) www.pearsonhighered.comGrossman, M. (Feb. 1999) Cyber terrorism http//www.mgrossmanlaw.com/articles/1999.cyberterrorism.htm Computer Security Policy and Research Institute. http.//www.cpi.seas.gwu.edu/aboutus.html www.research.ibm.com/antiviruswww.internetfraud.usdoj.gov

No comments:

Post a Comment